This course was created with the
course builder. Create your online course today.
Start now
Create your course
with
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Ethical Hacking and Penetration Testing: Course
Introduction
Objective (4:49)
Statistics
What to Expect
How to Get the Most Out of This Course
Module 1: Ethical Hacking Fundamentals
Lesson 1: What is Ethical Hacking?
Lesson 2: The Ethical Hacking Process
Lesson 3: Legal and Ethical Considerations
Lesson 4: Tools and Techniques in Ethical Hacking
Module 1 Quiz: Ethical Hacking Fundamentals
Module 2: Advanced Ethical Hacking Techniques
Objective
Lesson 1: Web Application Security
Lesson 2: Wireless Network Hacking
Lesson 3: Advanced Exploitation Techniques
Lesson 4: Social Engineering and Phishing Attacks
Lesson 5: Incident Response and Forensics
Module 2 Quiz: Advanced Ethical Hacking Techniques
Module 3: Specialized Ethical Hacking Domains
Objective
Lesson 1: Introduction to Cloud Security
Lesson 2: IoT Security and Ethical Hacking
Lesson 3: Mobile Application Security and Ethical Hacking
Lesson 4: Cryptography and Ethical Hacking
Module 3 Quiz: Specialized Ethical Hacking Domains
Module 4: Network Security and Ethical Hacking
Objective
Lesson 1: Introduction to Network Security
Lesson 2: Network Scanning and Enumeration
Lesson 3: Intrusion Detection and Prevention Systems (IDPS) in Ethical Hacking
Lesson 4: Social Engineering Attacks and Countermeasures in Ethical Hacking
Lesson 5: Ethical Hacking in the Internet of Things (IoT) Landscape
Lesson 6: Cryptographic Techniques in Ethical Hacking
Lesson 7: Advanced Social Engineering and Ethical Hacking: Red and Blue Teams
Module 4 quiz: Network Security and Ethical Hacking
Module 5: Capstone and Career Advancement in Ethical Hacking
Objectives
Lesson 1: Ethical Hacking Case Studies
Lesson 2: Ethical Hacking Tools and Resources
Lesson 3: Ethical Considerations and Legal Frameworks in Ethical Hacking
Lesson 4: Career Paths in Ethical Hacking
Module 5 Quiz: Capstone and Career Advancement in Ethical Hacking
Conclusion
Course Recap and Summary:
Certificate of Completion
Lesson 2: Network Scanning and Enumeration
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock